Nov. 6, 2023, 1:48 a.m. |

IACR News www.iacr.org

ePrint Report: Algebraic properties of the maps $\chi_n$

Jan Schoone, Joan Daemen


The Boolean map $\chi_n \colon \mathbb{F}_2^n \to \mathbb{F}_2^n,\ x \mapsto y$ defined by $y_i = x_i + (x_{i+1}+1)x_{i+2}$ (where $i\in \mathbb{Z}/n\mathbb{Z}$) is used in various permutations that are part of cryptographic schemes, e.g., Keccak-f (the SHA-3-permutation), ASCON (the winner of the NIST Lightweight competition), Xoodoo, Rasta and Subterranean (2.0).
In this paper, we study various algebraic properties of this map.
We consider $\chi_n$ (through vectorial isomorphism) as a …

ascon cryptographic defined eprint report map maps nist report sha-3 winner

Information System Security Officer / Auditor

@ Peraton | Washington, DC, United States

Senior Cloud Security Engineer

@ Alludo | US | Boston, MA, US | San Francisco, CA, US | Austin, TX, US

Tier 3 - Malware Analyst, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

Temp to Hire Senior DevSecOps Engineer

@ Scientific Systems Company, Inc. | Burlington, Massachusetts, United States

Security Engineer III - Splunk | SIEM

@ JPMorgan Chase & Co. | Plano, TX, United States

Information Systems Security Officer / Auditor

@ Peraton | Washington, DC, United States